ICT4Peace Support to UN OEWG and UN GGE, including Programme of Action PoA

UN OEWG ICT4Peace Cybersecurity Policy and Diplomacy preparatory  Workshop with African Diplomats

Cybersecurity Policy and Diplomacy preparatory  Workshop with African Diplomats

In preparation of the next  Round of negotiations on Cybersecurity by  the UN Open Ended Working Group (OEWG) (A/RES/73/27) and by the UN Governmental Group of Experts (UN GGE) (A/RES/73/266) from 2  ...

, , , , ,

UN OEWG & UN GGE: Preparatory Workshop with African Diplomats successfully completed

In preparation of the next  Round of negotiations on Cybersecurity by  the UN Open Ended Working Group (OEWG) (A/RES/73/27) and by the UN Governmental Group of Experts (UN GGE) (A/RES/73/266) from 2  ...

, , , , , , ,

UN OEWG | A New Process for an Old Problem: Governing State Behaviour in Cyberspace

An article by Paul Meyer, first published in Opencanada.org on 18 November 2019

This fall in New York, the United Nations held the first session of a new process to develop norms of responsible state behaviour in cyberspace. Since 1998, the UN has  ...

, , , , , , ,

UN OEWG UN GGE Cybersecurity Capacity Building workshop for African Diplomats in New York

On behalf of the Swiss Government, the UN Office for Disarmament Affairs and the African Union, ICT4Peace is honoured to organise on 27 November 2019 a Capacity Building Workshop on Cybersecurity  ...

, , , , , ,

IGF 2019 Berlin – Open Work Meeting on Cyber-Accountability: Building Attribution Capability

At IGF 2019 in Berlin, on Friday, November 29, 12:00 – 13:00, ICT4Peace, in cooperation with The Internet Governance Project (IGP) is organising an “Open Work Meeting on Cyber-Accountability: Building  ...

, , ,

UN OEWG UN GGE – A Call to Governments: Critical Infrastructure and Offensive Cyber Operations

An ICT4Peace Proposal for consideration by the UN OEWG and the UN GGE

Excellencies, Ladies and Gentlemen, ICT4Peace calls upon governments, especially those possessing offensive cyber capabilities, to publicly confirm that they will respect the norm prohibiting cyber operations directed at critical infrastructure.  ...

, , , , , , , , , ,